|
| No. | Symbol | Purpose |
|
| 1 | | A security parameter on HEC with 80 bit size |
| 2 | | A published set of defined parameter in IoD network |
| 3 | | Symbol used to represent HEC |
| 4 | | Symbol used to represent a finite field of order on HEC |
| 5 | | Symbol used to represent a divisor on HEC |
| 6 | | Symbol used to represent the public key of certifiers |
| 7 | | Symbol used to represent the private key of certifiers |
| 8 | | Symbols used to represent the irreversible cryptographic hash functions, that is, SHA 256 |
| 9 | | Symbol used to represent each user with |
| 10 | | Symbol used to represent the public key of each user with |
| 11 | | Symbol used to represent the private key of each user with |
| 12 | | Symbol used to represent the certificate of each user with |
| 13 | | Symbol used to represent the normal certificate based signature |
| 14 | | Symbol used to represent the aggregated certificate based signature |
| 15 | | Symbol used to represent Type1 attacker |
| 16 | | Symbol used to represent Type2 attacker |
| 17 | | Symbol used to represent maximum number of queries |
| 18 | | Symbol used to represent queries request for -oracle. |
| 19 | | Symbol used to represent a helper, which help to solve hyper elliptic curve discrete logarithm problem for and |
|